Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Educational institutions
biblio
A model for Human-computer trust: A key contribution for leveraging trustful interactions
Submitted by BrandonB on Thu, 04/30/2015 - 1:29pm
human computer interaction
user trust needs
user perceptions
trustful interaction leveraging
social phenomenon
psychology
participation history
Participation
Interaction design
human-computer trust model
Human-computer trust
human-computer iteration
collaboration
Engagement
Educational institutions
Correlation
Context
Computers
computer-mediated interactions
computer systems
computer science
computer mediated communication
Computational modeling
biblio
Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique
Submitted by BrandonB on Thu, 04/30/2015 - 1:21pm
Intermediate System
TTL
Servers
Round Trip Time (RTT)
Receivers
Probabilistic logic
probabilistic hop count filtering
probabilistic HCF techniques
packet filtering
network bandwidth jam
mitigation techniques
MATLAB 7
IP spoofing
IP networks
IP addresses
Broadband communication
information filtering
illegitimate packet filtering
host resources exhaustion
Hop Count Filtering (HCF)
Hop Count
Educational institutions
DPHCF-RTT packet filtering technique
Distributed Probabilistic HCF (DPHCF)
distributed probabilistic HCF
distributed DoS attacks
DDoS
conventional hop count filtering
conventional HCF techniques
computer network security
biblio
One-Layer Continuous-and Discrete-Time Projection Neural Networks for Solving Variational Inequalities and Related Optimization Problems
Submitted by BrandonB on Thu, 04/30/2015 - 12:57pm
one-layer continuous-time projection neural networks
Vectors
variational techniques
variational inequalities.
variational inequalities
sufficient conditions
projection neural network
optimization problems
optimization
optimisation
one-layer discrete-time projection neural networks
constrained optimization
Neural networks
neural nets
Mathematical model
Lyapunov stability
Lyapunov methods
global convergence
Educational institutions
discrete time systems
convergence
constrained variational inequalities
biblio
An external archive guided multiobjective evolutionary approach based on decomposition for continuous optimization
Submitted by BrandonB on Thu, 04/30/2015 - 12:51pm
learning (artificial intelligence)
Vectors
Statistics
Sociology
search problems
optimization
optimisation
Learning systems
learning information
Benchmark testing
information extracts
external archive guided multiobjective evolutionary approach
evolutionary search process
evolutionary computation
Educational institutions
decomposition based multiobjective evolutionary algorithm
continuous optimization problem
biblio
An improved harmony search algorithm with dynamic control parameters for continuous optimization problems
Submitted by BrandonB on Thu, 04/30/2015 - 12:51pm
Harmony search
Vectors
search spaces
search process
search problems
pitch adjustment rate
PAR
optimization
optimisation
Meta-heuristics
HS variants
Heuristic algorithms
harmony search algorithm
Algorithm design and analysis
harmony memory
Evolutionary algorithms
elimination principle
Electronic mail
Educational institutions
Dynamic parameter
dynamic control parameters
continuous optimization problems
Continuous optimization
bw
bandwidth distance
biblio
Parallel Construction of Independent Spanning Trees on Enhanced Hypercubes
Submitted by BrandonB on Thu, 04/30/2015 - 12:45pm
Broadcasting
Educational institutions
Electronic mail
enhanced hypercubes
fault diameter
fault tolerance
Fault tolerant systems
folded hypercubes
Hypercubes
independent spanning trees
interconnection networks
Vegetation
wide diameter
biblio
The Psychology of Security for the Home Computer User
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
Phishing
usability and security
Software
security interventions
security decisions
security breaches
security
risky behavior
privacy
Computational modeling
home users
home computer user
Electronic mail
Educational institutions
Computers
computer security
Computer crime
« first
‹ previous
1
2
3
4
5
6
7